12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015
نویسندگان
چکیده
The 12th IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS 2015) will be held in Dallas, Texas, USA, October 19 – 22, 2015. Wireless ad hoc communication, Internet of Things, and mobile computing have applications in a variety of environments, such as smart homes, hospitals, battlefields, and disaster-recovery operations. Wireless sensor and actuator networks are being deployed for enhancing industrial control processes and supply-chains, and for various forms of environmental monitoring. IEEE MASS 2015
منابع مشابه
Braving the broadcast storm: infrastructural support for ad hoc routing
Several routing algorithms for mobile ad hoc networks have been proposed in the recent past [Broch et al., The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, Internet Draft draft-ietf-manet-dsr-03.txt, October 1999; Perkins et al., Ad Hoc On Demand Distance Vector (AODV) Routing, Internet Draft draft-ietf-manet-aodv04.txt, October 1999; Haas and Pearlman, The Zone Routing Protocol ...
متن کاملPerformance Analysis of DSR and OLSR Routing Protocols for Fixed Wireless Sensor Networks (WSN)
Wireless Sensor Network (WSN) has been regarded as a distinguished Ad Hoc Network that can be used to fulfil multiple tasks and applications. Since a WSN consists hundreds of small size, low cost and battery powered sensor nodes. These nodes have the event sensing capabilities, data processing capabilities. Number of routing protocols has been implemented to perform routing in these networks. I...
متن کاملPrivacy-preserving targeted mobile advertising: requirements, design and a prototype implementation
=1884356 [last accessed 6 April 2016].19. Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin ofScience, Technology & Society 2008; 28(1):20–36.20. Madden M, Lenhart A, Cortesi S, Gasser U, Duggan M, Smith A, Beaton M. Teens, social media, and privacy. Available at: http://www.pewinternet.org/2013/05/21/teens-social-media-and-pr...
متن کامل2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, December 7-10, 2013
متن کامل
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کامل